Sciweavers

5722 search results - page 327 / 1145
» Security Function Interactions
Sort
View
JAIS
2010
105views Algorithms» more  JAIS 2010»
14 years 10 months ago
Effects of Interactivity on Website Involvement and Purchase Intention
This study aims to understand how website interactivity (active control and reciprocal communication) can impact purchase intention through website involvement and how the impacts...
Zhenhui Jiang, Jason Chan, Bernard C. Y. Tan, Wei ...
162
Voted
FGR
2011
IEEE
271views Biometrics» more  FGR 2011»
14 years 7 months ago
Robust 3D hand tracking for human computer interaction
Abstract— We propose a system for human computer interaction via 3D hand movements, based on a combination of visual tracking and a cheap, off-the-shelf, accelerometer. We use a ...
Victor Adrian Prisacariu, Ian Reid
119
Voted
WWW
2010
ACM
15 years 9 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
183
Voted
FASE
2008
Springer
15 years 5 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
IEEESCC
2007
IEEE
15 years 10 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung